background
All Cases

Behavioral identification app

Project Info

Client

An ISV provider of software for enterprise information security in Saudi Arabia

Service

A solution that provides biometric authentication for enterprise security on both Windows OS system and centralized data levels

Technologies

Windows Forms, WPF and C++

Industry

Independent Software Vendors (ISVs)

Duration

8 Months

Team Size

12 specialists
We developed an enterprise security application, addresses the vulnerability of traditional passwords, especially within large organizations where valuable business information is at stake. Recognizing the focus of malicious actors on such data, we developed it to enhance security. By collecting and analyzing individual behavioral biometrics data, such as keystroke timing, the application ensures a robust and secure authentication process.

Challenge

One challenging task involved modifying the Windows login screen, a complex undertaking due to its security implications. The client, lacking expertise in this area, sought our assistance in implementing this crucial feature. Additionally, they needed standard web and desktop development services.

Solution

innovaTech possesses a specialized desktop development expertise, and through thorough research, we successfully devised a strategy to implement the key feature that significantly enhanced the product's market appeal.

Impact

innovaTech's focused desktop development proficiency, coupled with extensive research, enabled us to discover a solution for implementing the feature that serves as the product's primary selling point.

Core features

Application architecture:
  • icon 1 - Authentication module.
  • icon 2 - Biometrics data collection.
  • icon 3 - Behavioral data analytics.
  • icon 4 - Security admin panel.
Highlights: With a decade of experience in software development, each project has contributed unique insights to our wealth of knowledge. Among the crucial lessons learned, we emphasize the importance of a well-structured plan. Our approach involves crafting detailed plans with sprints and milestones tailored to the specific software development methodology chosen for each project.

15 Meetings

conducted for discovery between the client and innovaTech team.

200 Hours

spent by our business analysts for calls and documentation.

8 Weeks

actual duration of the discovery stage.

Discovery stage

1 - Authentication module:

We seamlessly integrated a method that mirrors the standard Windows login screen, ensuring a user-friendly experience without additional steps. This approach captures individual behavioral biometrics data, analyzing keystroke delays, and sending the information to the backend for AI-driven pattern analysis. The AI constructs a biometric profile, enabling matching with each login attempt. This added layer of security adapts to changes in the user's behavior over time, enhancing protection against unauthorized access even if login credentials are compromised.

icon

The application functions as a supplementary security layer following the standard Windows user password check.

Project
2 - Security admin panel:

The foundations of enterprise cybersecurity encompass centralized control over workstation access, comprehensive login attempt logs, efficient user management, automated monitoring of suspicious activities, and remote access restriction capabilities. To deliver these functionalities to our customers.

icon

we focused on enabling swift and reliable data transfer to the admin panel, providing access to the entire system and its aggregated data.

Project
3 - Authentication dashboard:

This tab furnishes administrators with authentication-related statistics, displaying the count of authentications conducted within a specific timeframe, encompassing both successful and unsuccessful attempts.

icon

offers insights into continuous authentication.

icon

capturing user behavior throughout the entire session.

icon

spanning from login to logout.

Project
4 - Behavior check settings:

Within the admin panel, administrators have the flexibility to adjust the level of verification stringency. They can activate or deactivate various layers of authentication, including keystroke and mouse biometrics, either on an individual user basis or globally.

Project
5 - User management:

Administrators are consistently equipped with real-time data regarding all system users and comprehensive statistics on their behavior.

icon

The AI component assesses the risk level associated with each authentication attempt.

icon

This information is meticulously documented in each user's personal account.

Project

+2700 Hours

spent by the development team on coding.

+230 Hours

of project manager's engagement.

+1350 Hours

time dedicated to quality assurance.

28 Weeks

duration of the development stage.

Development and testing

Integration with Windows Hello Aunthentication Screen

Integrating such a solution demanded an in-depth comprehension of low-level desktop OS architecture. The product interacts with the Windows login screen, a highly intricate task due to the security-centric nature of this feature and its multiple layers of protection.

icon

Our integration involved working with the Windows security service through the Credential Provider (ICredentialProvider, ICredentialProviderCredential2) feature, ensuring seamless integration of invisible users with the Windows login screen.

icon

Additionally, we implemented a Windows Installer (MSI) using Wix, facilitating the installation of the Custom Credential Provider on a target machine, either through manual installation or group policy deployment.

Project
Technologies

To access the Windows login feature, we opted for WPF and Windows Forms for the frontend technology. For the backend, we chose C++, a reliable and secure technology that has demonstrated its credibility. This technology stack allowed us to seamlessly integrate with the Windows environment and ensure the robustness of our solution.

icon

Back-end: C++ takes the #10 place among the most popular languages

icon

Front-end: 10+ popular languages can be used to program for the Windows platform

icon

IDE: #1 is Visual Studio - is used for WPF

icon

Development tools: 785 tasks in Jira visible to the client & 20k+ people can use Jira simultaneously

Project

How we ensure visibility for the client

icon

Agile development methodologies emphasize flexibility, collaboration, and iterative progress

icon

Weekly progress calls to discuss ongoing developments and milestones

icon

Dedicated project and account managers to ensure plans are on the way

Conclusion

Our objective was to develop an enterprise application surpassing the security offered by lengthy and complex passwords. The app needed to guard against various threats, including malware, social hacking, phishing, brute-force attacks, and password database leaks.
Drawing on our distinctive expertise in desktop operating systems architecture, we successfully contributed to the creation of a robust product that mitigates these potential threats to enterprise cybersecurity.
Notably, we achieved the challenging task of modifying the Windows login feature, seamlessly integrating it into the innovative and secure software platform.

Prev

Jordan

Amman

King Hussein Business Park, Medical City Road - 11831

+ 962 781 876 794
amman[email protected]

Turkey

Istanbul

Trump Towers, Şişli - 34379

+ 90 700 300 000
turkey[email protected]

Contact Us